A Noval Approach on Online Transaction Protocols
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 7
Abstract
The increase of wireless devices, offering connectivity and convenience, continues to exert marvelous demands on merchants to deploy secure wireless applications including electronic commerce. Secure Socket Layer (SSL) and Transport Layer Security (TLS) is the protocol above TCP, which can protect user’s privacy when they sending data from a client side to a web server, this is an important protocol due to the expansion of Internet. In fact, it is a long way to make the SSL/TLS protocol perfectly. Although the Secure Electronic Transaction (SET) protocol offers end-to-end security for credit card transactions over a wired infrastructure, there are several factors including bandwidth requirements which make it unsuitable for wireless applications. In this paper we review a secure electronic payment system for Internet transaction. The electronic payment system is to be secure for Internet transaction participants such as Payment gateway server, Bank sever and Merchant server. The security architecture of the system is designed by using Many Security Protocols and techniques, which eliminates the fraud that occurs today with stolen credit card/debit card payment information and customer information. Electronic commerce involves the exchange of some form o f money for goods and services over the Internet but today, Internet is an insecure and unreliable media. The asymmetric key cryptosystem The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication. The multiple encryption technique provides sufficient security for electronic transactions over wireless network.
Authors and Affiliations
Ms. Renu
DURABILITY OF FIBER REINFORCED CONCRETE WITH ARTIFICIAL SAND
Concrete is the combination of cement, natural sand or artificial sand and aggregate which are used in civil engineering works such as township project and infrastructure work . The present research work shows the...
EQUILIBRIUM AND KINETIC STUDIES OF BIOSORPTION OF REACTIVEORANGE 13 FROM AQUEOUS SOLUTION BY DEAD BIOMASS OF RHIZOPUSARRHIZUS
The equilibrium and kinetics of the biosorption of Reactive Orange 13from aqueous solution were investigatedusing dead biomass of Rhizopus arrhizus in a batch system. Biosorption equilibrium was established in abou...
Critical Event Monitoring in WSNS using Level-By-Level Offset Based Wake up Pattern
This paper proposed to monitor a critical event in wireless sensor networks. Whenever a critical event occurs, the critical event is detected by the nearby sensor nodes. Immediately these sensor nodes should broad...
Trusted Operating System Approach for Security of an OS with JAVA
In a little more than a decade since the inception of the Java language, the Java ecosystem has evolved into one that businesses around the world look to for secure, ro enterprise. Java was created to be exploited in h...
PERFORMANCE COMPARISON OF REED-SOLOMON CODE USING M-ARY PSK AND FSK MODULATION IN AWGN CHANNEL
The main aim of this paper is to analyze the Bit error rate (BER) performance of Reed Solomon code (RSC) using Mary PSK and FSK modulation techniques in the presence of noisy channel i.e. (Additive White Gaussian...